Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

18 DEC 07 - PRT Nuristan Update

2007-12-18 08:00:00

Expand acronyms:
Take care; definitions may be wrong.

Javascript required for full view

Limited script-free view:

PRT Engineer &amp;amp;amp; CAT-B met with contractor Muhamad Hadi with Nooriana Building and Construction Company regarding projects for the Titen Valley.
PRT Engineer &amp;amp;amp; CAT-B met with contractor Hadji Abdul Hai with Arianna Bastan Architecture &amp;amp;amp; Construction Company. This individual signed a contract for a micro-hydro in Bargi Matal. Also reviewed scope of work and requirements for bridge contract in Bargi Matal.
PRT Engineer, CAT-B &amp;amp;amp; Effects met with contractors from Ariana Hekmat Construction Company regarding work stoppage of FOB wall in Parun. Representatives from AHCC included Zacharia Nuristani and Syedabbas Pacha. They reviewed an invoice for expenses accrued in their attempt to start construction in Parun but unable to start work because of opposition from the villages of Mondi &amp;amp;amp; Pashki. Zacharia Nuristani indicates that he participated in a 7 day shura that included 2 of the local mullahs but were unsuccessful in reaching agreement to place the FOB at the site approved by the Defense Ministry. Copies of the approval document were provided to the Shura members, but the representatives of Mondi and Pashki do not want the FOB on their land. It is the contractors opinion that the villagers are afraid of Al Qaeda forces in the area and retribution if the FOB is allowed to be built on their lands. To illustrate the point Zacharia indicated that the government lands south of the proposed site are not opposed by the shura members because it is land that is already ceded to the government and would be viewed as &amp;amp;quot;out of their hands and control&amp;amp;quot; therefore resulting in no retribution from Al Qaeda in the area. Engineer Zacharia Nuristani provided further feedback that a man whom he referred to as &amp;amp;quot;Abdurrahman&amp;amp;quot; from the Kamdesh region beat one of his engineers and had attempted to kidnap him before abandoning the job site. Engineer Zacharia Nuristani further claimed to have spoken to the driver of the police chief of Bargi Matal who was recently assassinated and indicated that Abdurrahman was directly involved in that event. He believed that Abdurrahman was currently in Pakistan in the Peshawar area. He said this individual&amp;amp;apos;&amp;amp;apos;s mother was from Bagigal and has been Taliban for approximately 7 years. Engineer Zacharia went on to claim that &amp;amp;quot;there are a lot of Al Qaeda in Parun&amp;amp;quot; and indicated that many have been trained in Kashmir. He indicated that Al Qaeda did not cause trouble in Parun because by doing so it would draw attention to the area. However, many of these men were involved in incidents in the Wama, Kordar and Kunar regions. The contractor was requesting 10% payment for materials and labor costs that were incurred in his attempt to build the FOB wall. We indicated that his invoices will be forwarded to Brigade Engineering and contracting at FOB Fenty for their review and consideration. Information forwarded to S2. In terms of background information regarding this issue, Gov Nuristani has been working directly with the PRT commander in attempting to resolve the work stoppage issue. Numerous phone calls were made and and a shura meeting was held at the last Parun PDC in early November. The shura included the elders from Pashki and Mondi with direct participation of the PRT commander and Gov Nuristani.